I think Andrew is a little too cynical regarding some of these process charts. Some are used to sell products, and often reflect vendor biases. Others are just ways to break the security problem down into manageable chunks.

I use the diagram at right in my classes to emphasize the traffic-centric approach I take to network security operations.
Does this make me bad? I doubt it.